iPhone.
Sure, you knew that.
But, can you name Time's Law & Order inventions of the year?
Hint... Both work at the speed of light.
High-speed chases may be money shots in Hollywood, but everywhere else they're just dangerous. The StarChase Pursuit Management System uses a laser-guided launcher mounted on the front grill of a cop car to tag fleeing vehicles with a GPS tracking device. Then the fuzz can hang back as real-time location data are sent to police headquarters.
Available: Early 2008 (more)
The hunt for better non-lethal weaponry gained new urgency when several people died in recent years after being shocked by a Taser. The LED Incapacitator, funded by the Department of Homeland Security, is a novel alternative. When officers shine the flashlight-like device in a person's eyes, high-intensity LEDs, pulsating at varying rates, will make the suspect temporarily blind and dizzy. Available: 2008. (more)
IL - A lawyer in Wheaton hid his cameras in a roll of toilet paper and a basket of potpourri in the women's restroom.A bar owner in Downstate Chatsworth concealed his in a bathroom fan and a laundry basket.And in East Dundee a podiatrist stands accused of tucking a camera underneath an examination table so he could watch patients undress.Though authorities charged the three men with other felonies in connection with these acts, the actual videotapings were only misdemeanors. Illinois statutes, it seems, are as outdated as Super 8 film.But a new state law going into effect Jan. 1 fast-forwards the criminal code into the 21st Century by making it a felony to record or transmit images of an adult in a restroom, tanning bed, tanning salon, locker room, changing room or hotel room without permission. If convicted, violators could face up to 3 years in prison.
At least 19 states, including Indiana, currently classify video voyeurism as a felony, according to the National Center for Victims of Crime. At least four others have bills pending. (more)
I'm not paranoid, that's him! (more)
Got some free time?Want to amaze your friends and surprise your enemies?This video is designed to demonstrate how to make a fake satellite spy video using Google Earth. Big Brother Is Watching You. (video)
NY - Christina M. Paikin, 36, of Seneca Street in Chittenango, was charged with eavesdropping, possession of an eavesdropping device and second-degree criminal contempt. She is scheduled to appear in the Town of Sullivan Court Jan. 7. (more)
They read...
From the publisher...
"The purpose of this [site] is to provide reviews and recommendations on specific products, books, websites, etc and to implement technology based solutions for your investigative needs. It is kind of a "gadget reports/warehouse" which is investigative related only." (link)
(Summary of an article by Gerhard Lindenmayer)
1. Layered Approach2. Encrypt, Encrypt, Encrypt 3. Security Policy Enforcement4. Strong Password Protection5. Antivirus6. Employee Data Removal7. Internet Access Restrictions8. Regularly Scheduled Patches9. Firewalls and Intrusion 10. Regular Penetration Tests
(See the full article for an explanation of these concepts.)
It looks like a power strip.
It acts like a power strip.
It also acts as a surge protector.
What could possibly go wrong?
Ahh, well, ummm... It turns into a giant wireless eavesdropping microphone when called from any telephone in the world!
But, don't let that bother you. It really is a great surge protector. So great, it even surge-protects your telephone! What could possibly go wrong?
Ahh, well, ummm... If you plug your telephone into it the damn thing becomes a wiretap ...which can be monitored from any telephone in the world!
But, don't let that bother you. What are the chances that someone would call in and monitor your room or your phone calls just at the moment you are talking?
Ahh, well, ummm... The damn thing also has ears! Whenever it hears you say anything - in the room, or on the phone - it snitches on you!!! It sends a freekin' text message to your eavesdropper!
"No problem." I hear you say, "Thanks for the tip and the photo, Kevin. Now that I know what this horrid little thing looks like I'll keep alert."
Dude! This gizmo can be built into anything. Eavesdropping detection audits are a standard business practice. You need to start checking for these things, now. Call me, from a safe phone. (more)
Australia - A defense lawyer for the man accused of bugging the telephone calls of murdered Supreme Court registrar Corryn Rayney was negotiating with the prosecution, Perth Magistrate’s Court was told yesterday.
Timothy Matthew Pearson appeared on one Commonwealth charge of intercepting a communication passing over a telecommunications system. (more)
AccessPoint - Digital KeySafeDesigner key box with electronic time stamp that records last nine access events. Easy to use, one hand operation ensures quick access. Low profile, subtle design compliments door frame with a variety of natural colors. Change code anytime for added security. Solid, weather resistant metal construction. Know what time your children and others enter your home.

KeySure - One-time Use Plastic Container
Patented key control product is a "keyless" lock box. It is a container in the form of a security seal, to access the key; the box must be physically broken. It prevents keys from being handled, duplicated or used surreptitiously. A product for keys not accessed on a regular basis. (additional options)
As of midnight on February 18, 2008, cellular telephone companies will not be required to provide analog service. While most wireless telephone users will not be affected by this transition (often called the “analog cellular sunset”), some users may be affected. In addition, the transition could affect some alarm systems and some users of OnStar in-vehicle communications service.You will not be affected by the transition if you:•
use a digital handset; or• subscribe to wireless service from Sprint/Nextel or T-Mobile.You may be affected by the transition if you:• use an analog-only handset (there are very few of these left in service); and• receive service from a cellular telephone company, including AT&T Mobility, Verizon Wireless, Alltel, US Cellular, and Dobson (and other companies that market their services as “Cellular One”); or if you• use service that may rely on analog cellular radio equipment, such as an alarm system with a wireless radio link or OnStar service in an older vehicle. (more)
vendetta - noun
1. A feud between two families or clans that arises out of a slaying and is perpetuated by retaliatory acts of revenge; a blood feud.
2. A bitter, destructive feud.
An Italian newspaper has posted a seven-minute secretly taped phone call on the internet in which Silvio Berlusconi (former Italian president) apparently tries to persuade state broadcaster, RAI's head of drama to hire two actresses. The alleged reason is to encourage two centre-left politicians linked to the women to join his opposition bloc in parliament...The phone call was recorded by police as part of an ongoing investigation into corruption allegations concerning Berlusconi and RAI. Italy's richest man denies any wrongdoing, dismissing the country's prosecutors as a "Red Army". (more)
vendetta - noun
1. A feud between two families or clans that arises out of a slaying and is perpetuated by retaliatory acts of revenge; a blood feud.
2. A bitter, destructive feud.
Ferrari still fuming over spy case...Ferrari's senior management has made it clear that it remains far from happy about McLaren's handling of the spy affair - and especially their continued insistence they had done nothing wrong until a recent public letter of apology. Ferrari president Luca di Montezemolo and company CEO Jean Todt both hit out at McLaren during a meeting with the Italian press, stating they were furious at the way their Woking-based rivals approached the FIA hearings into the spying affair. Quoted by Corriere dello Sport, Todt said: "At the hearing McLaren came with 200 signatures of managers saying they never had access to the information."Then, three months later, when the FIA did its verifications, it was demonstrated that was completely false. They went corrupting their own personnel to make them sign false documentation. (more)
Ferrari Rewards Photocopy Employee Who Tipped Off F1 to Spy Scandal...
Montezemolo also revealed that the English photocopy shop employee, who alerted Ferrari about confidential information in McLaren's possession, has been invited to the team's Maranello factory. (more)
Charlie Wilson's War
Tom Hanks and Philip Seymour Hoffman turn in their greatest performances in years in this historical thriller riddled with hilarious one-liners.Hanks stars as Charlie Wilson, a congressman from Texas ... Upon returning to the States, Wilson immediately calls for a meeting with a U.S. security bigwig. CIA Agent Gust Avrakotos (Hoffman) ends up at his office door.After a hysterical sequence of events during their brief meeting that includes a cocaine scandal, a bottle of wine and a bugging device, the two pair up to try to covertly help the Afghan war effort. (more) (trailer) (reality check)
Despite the widespread proliferation of iPhones, Blackberries and other state-of-the art devices, concerns over invasions of privacy by the Bush Administration is leading to a Luddite-like return to more primitive modes of communication, including the time-honored “tin can and string.”
While somewhat larger and less chic than the more high-tech hand-held devices, “tin can conversations” are extremely difficult to “bug,” and create no permanent record of communications that can later be “data-mined” by NSA super-computers.
Although the traditional range of these home-made devices was typically no more than 55 feet, newer, mass-produced versions offer strings as long as 55 miles, and come in a variety of colors, including black, gold, hot pink, and for traditionalists, “silver can.”
Apple has announced that it’s coming out with the ”iCan” next Spring, which will also double as a device to download music. Unfortunately, the only selection available will be the “can-can” song. (more)